Since January, the Philadelphia CBP has seized more than 100 Shipments of Illicit Dermal Fillers

Even during times of great concern, people feel the need to look their very cosmetic best and to do so at the best price possible. What they don’t realize is that the cheaper dermal filler they purchase online could potentially make them ill, or never reach their doorstep because they violate U.S. import laws.

Since the beginning of the year, Customs and Border Protection officers in Philadelphia have seized more than 100 shipments of dermal filler bearing the brand names of Juvederm, Teoxane, Teosyal, Sculptera, Orthovisc, Revanesse, Restylane, Dyasport, and of course the more popularly known Botox.

CBP seized the dermal filler shipments for violating the Federal Food, Drug and Cosmetic Act, specifically 21 USC 331, and for violating import licensing and permit requirements (19USC1595a). The shipments, which arrived aboard air cargo flights from Germany and Poland, were destined to addresses in states across the United States, but Florida was the most popular. The domestic value of each shipment ranged from less than $300 to $450, cheaper than what consumer would pay in the United States.

“American consumers should exercise caveat emptor, or buyer beware, that just because you purchase an item more cheaply online overseas does not necessarily mean it is lawful for importation to the United States or safe for consumer use,” said Joseph Martella, Area Port Director for the Area Port of Philadelphia. “Customs and Border Protection officers will continue to work with the trade industry and our consumer safety partners to intercept illicit and potentially dangerous products at our nation’s ports of entry.”

Consumers should also be aware that products purchased online may be counterfeit products that may have been manufactured in unregulated facilities with substandard or harmful ingredients. CBP urges consumer to buy from reputable vendors.

The Food and Drug Administration offers safety tips for dermal fillers, including never purchasing dermal filler on the Internet because they may be counterfeit, contaminated or harmful.

CBP’s border security mission is led at ports of entry by CBP officers from the Office of Field Operations. CBP officers screen international travelers and cargo and search for illicit narcotics, unreported currency, weapons, counterfeit consumer goods, prohibited agriculture, and other illicit products that could potentially harm the American public, U.S. businesses, and our nation’s safety and economic vitality. Please visit CBP Ports of Entry to learn more about how CBP’s Office of Field Operations secures our nation’s borders. Learn more about CBP at (March 2020) Philadelphia CBP Seizes more than 100 Shipments of Illicit Dermal Fillers since January

Lt. Col. Buzz Patterson Primary election success with endorsement by Combat Veterans for Congress

Support for Decorated Air Force Veteran Growing Rapidly in Highly Contested Race

On Monday, the Combat Veterans for Congress PAC endorsed Lt. Col. (Ret.) Robert “Buzz” Patterson for the 7th Congressional District election in November 2020 and was announced today by Mimi Soros, campaign manager for Buzz Patterson for Congress.

Patterson, a decorated veteran, former White House aide, community leader, and commercial airline pilot, is the Republican candidate in a highly competitive district representing southern and eastern Sacramento County, California.

Patterson’s more than 32,000 votes in the March primary election nearly equaled those cast for the incumbent and easily qualified him for the 2020 general election in November.

Although historically Democratic, the district has been rated “even” by the Cook Partisan Voting Index.

Patterson’s campaign is focusing on reducing his District’s high unemployment, addressing problems caused by illegal immigration, improving economic growth and lack of affordable health care in the District, issues which, after two terms in Washington, D.C., are plaguing his opponent’s campaign and track record showing a lack of focus on the District’s most important local issues.

In the endorsement, Combat Veterans for Congress PAC praised Patterson’s dedication to local leadership and service to the nation, stating “in Buzz Patterson we have a combat veteran who General George Washington would have approved of. Buzz is a veteran who wrote a blank check payable to the United States of America for an amount “up to and including his life.”

Patterson is a fiscally conservative candidate who will work to reduce the national debt, strengthen US Armed Forces, protect freedom of religion and speech and defend traditional family values.

 “I am dedicated to helping my constituents solve important local problems being ignored by those in Washington, so am truly grateful for the endorsement of Combat Veterans for Congress PAC,” Patterson stated. “Their support will help us greatly in the District and throughout our state in November.”

Combat Veterans for Congress PAC joins an impressive roster of endorsements for Patterson that includes the California GOP, Sean Hannity, Brandon Straka (WalkAway), LAGOP, Sacramento County Republican Assembly, and former Chairman of the California GOP and conservative political leader and commentator, Tom DelBeccaro.

Patterson also received endorsements from the Howard Jarvis Taxpayers Association, National Right to Life, the California Republican Assembly, the Cosumnes Republican Assembly, California State Senator Jim Nielsen, former California State Senator Ted Gaines, and popular conservative radio talk show hosts, Mark Larson and Phil Cowan.

Patterson served 20 years as a United States Air Force pilot, was a former Senior Military Aide to President Bill Clinton, and recipient of numerous military commendations, including the Defense Superior Service and Air Force Air Medals.

His tours of duty included world-wide and combat operations in Grenada, Somalia, Rwanda, Haiti, and Bosnia.

While serving at the White House, Patterson was responsible for the “Nuclear Football,” the satchel containing the nation’s nuclear capability that always accompanies the President and was commander of all White House military personnel and operations.

He is a member of the Air Force Association, the Airlift Tanker Association, the NRA, American Legion, and the VFW.

A Republican and a native of North Carolina, Patterson and his family moved to California following his retirement from military service in 2001 to pursue a career as a commercial airline pilot, writer, speaker, and community leader.

More information can be found at

MEDIA CONTACT: Mimi Soros 916-470-8737/
Peter Bylsma 310-795-8532/ (March 2020) Support for Decorated Air Force Veteran Growing Rapidly in Highly Contested Race

District Court Orders Injunctions against Two Telecom Carriers Who Facilitated Hundreds of Millions of Fraudulent Robocalls to Consumers in the United States

Fraudulent Robocalls to Consumers in the United States

First of Their Kind Injunctions Obtained by Justice Department

The U.S. District Court for the Eastern District of New York has entered orders in two separate civil actions, barring eight individuals and entities from continuing to facilitate the transmission of massive volumes of fraudulent robocalls to consumers in the United States, the Department of Justice announced on Friday. 

In one of the matters, United States v. Nicholas Palumbo, et al., the District Court entered a preliminary injunction that bars two individuals and two entities from operating as intermediate voice-over-internet-protocol (VoIP) carriers during the pendency of the civil action.  In the other matter, United States v. John Kahen, et al., the District Court entered consent decrees that permanently bar an individual and three entities from operating as intermediate VoIP carriers conveying any telephone calls into the U.S. telephone system.

“These massive robocall fraud schemes target telephones of residents across our country, many of whom are elderly or are otherwise potentially vulnerable to such schemes,” said Assistant Attorney General Jody Hunt of the Department of Justice’s Civil Division.  “The department is committed to stopping this unlawful conduct and pursuing those who knowingly facilitate these schemes for their own financial gain.”

“This office will take all appropriate measures to stop fraudulent robocalling schemes responsible for causing catastrophic losses to victims, including seeking to permanently shut down the U.S.-based enablers of such schemes,” said United States Attorney Richad P. Donoghue for the Eastern District of New York.  “Protecting elderly and vulnerable individuals from being conned by foreign call center scammers remains a priority of this office and the Department of Justice.”

As alleged in the complaints, the defendants in both cases operated as VoIP carriers, receiving internet-based calls from other entities, often located abroad, and transmitting those calls first to other carriers within the United States and, ultimately, to the phones of individuals. 

Numerous foreign-based call centers are alleged to have used the defendants’ VoIP carrier services to pass fraudulent government- and business-imposter robocalls to victims in the United States.  The defendants also sold U.S. phone numbers to foreign entities, which were used as victim call-back numbers as part of massive robocalling fraud schemes.

As also alleged, the defendants were warned numerous times that they were carrying fraudulent robocalls — including calls impersonating government agencies, such as the Social Security Administration, the IRS, and legitimate businesses, such as Microsoft — and yet continued to carry those calls and facilitate fraud schemes targeting individuals in the United States. 

Many of the robocalls were made by foreign fraudsters impersonating government investigators and conveying alarming messages, such as: the recipient’s social security number or other personal information has been compromised or otherwise connected to criminal activity; the recipient faces imminent arrest; the recipient’s assets are being frozen; the recipient’s bank and credit accounts have suspect activity; the recipient’s benefits are being stopped; the recipient faces imminent deportation; or combinations of these threats. 

Each of these claims was a lie, designed to scare the call recipient into paying large sums of money.  These calls led to massive financial losses to elderly and other vulnerable victims throughout the United States.

“The court’s decision sends a clear message to gateway carriers who knowingly do business with scammers targeting Americans from overseas,” said Gail S. Ennis, Inspector General for the Social Security Administration.  “We will continue to pursue those who facilitate these scam calls by allowing them into the U.S. telephone network.  I want to thank the Department of Justice for its support throughout this investigation and its commitment to protecting Americans from this insidious form of fraud and theft.”

United States v. Nicholas Palumbo, et al.

In the first case, the District Court issued a preliminary injunction against spouses Nicholas and Natasha Palumbo of Scottsdale, Arizona, and the Arizona companies they own and operate, Ecommerce National LLC d/b/a and SIP Retail d/b/a  The District Court held, in a written opinion, that the evidence presented by the United States demonstrated probable cause to conclude that the defendants were engaged in “widespread patterns of telecommunications fraud, intended to deprive call recipients in the Eastern District of New York and elsewhere of money and property.”

The preliminary injunction issued by the court bars those defendants from carrying any VoIP calls destined for phones in the United States and providing any U.S. telephone numbers (often used as call-back numbers in the fraudulent robocalling schemes) to any individuals or entities during the pendency of this litigation. 

The court noted that though defendants had been warned more than 100 times of specific instances of fraudulent calls being transmitted through their network, they never severed their business relationship with any entity they learned was associated with fraudulent call traffic, prior to the United States’ filing of its lawsuit. 

The court further noted that “the telecommunications ‘intermediary’ industry is set up perfectly to allow fraudulent operators to rotate telephone numbers endlessly and blame other parties for the fraudulent call traffic they carry,” that the United States “demonstrat[ed] probable cause to conclude that defendants’ business is permeated with fraud,” that “multiple individual victims in the United States suffered significant fraud losses,” and that “[e]very day that the defendants’ actions in this vein continue, the public is at risk of harm in the form of additional high-dollar fraud losses.”

The claims in the United States v. Nicholas Palumboet al. matter are allegations only, and there has not been any final determination of liability or wrongdoing.

United States v. John Kahen, et al.

In the second case, the District Court entered consent decrees permanently resolving the matter against five individuals and entities who were also operating intermediary VoIP carriers.  The court entered a consent decree on March 2, 2020 against Jon Kahen, a/k/a Jon Kaen of New York, and New York corporations Global Voicecom Inc. and Global Telecommunication Services Inc., permanently barring those defendants from, among other things, using the U.S. telephone system to: deliver prerecorded messages through automatic means, carry calls to the United States from foreign locations, and provide calling and toll-free services for calls originating in the United States. 

In addition, the defendants are permanently barred from serving as employees, agents, or consultants to any person or entity engaged in these activities.  In a second consent decree, entered on March 24, 2020, the District Court barred KAT Telecom Inc., a New York corporation, from conveying or causing any other person or entity from conveying fraudulent telephone calls, fraudulent recordings, and unauthorized “spoofed” telephone calls.  In the event that KAT Telecom, Inc. resumes operations, it must also implement strong anti-fraud measures, including anti-fraud monitoring, mitigation, and know-your-customer measures.

The claims resolved by the settlement in the United States v. Jon Kahenet al. matter are allegations only, and there has not been any final determination of liability or wrongdoing. 

These cases are being handled by Trial Attorneys Ann F. Entwistle and Charles B. Dunn of the Civil Division’s Consumer Protection Branch and Assistant U.S. Attorneys Bonni Perlin, Dara Olds, and Evan Lestelle of the U.S. Attorney’s Office for the Eastern District of New York, in coordination with the Social Security Administration Office of the Inspector General and the U.S. Postal Inspection Service.  Investigative support was also provided by the U.S. Treasury Inspector General for Tax Administration, U.S. Immigration and Customs Enforcement’s Homeland Security Investigation’s El Dorado Task Force and U.S. Secret Service. 

The Federal Trade Commission and the Federal Communications Commission also provided pertinent data. (March 2020) District Court Orders Injunctions against Two Telecom Carriers Who Facilitated Hundreds of Millions of Fraudulent Robocalls to Consumers in the United States

Man Who Attempted to Bomb Downtown Oklahoma City Bank Sentenced to 25 Years

On Monday, Jerry Drake Varnell, 26, of Sayre, Oklahoma, was sentenced to serve 25 years, followed by a lifetime term of supervised release, for attempting to use a weapon of mass destruction at BancFirst in downtown Oklahoma City.  

United States Attorney Timothy J. Downing of the Western District of Oklahoma, Special Agent-in-Charge Melissa R. Godbold of the FBI’s Oklahoma City Field Office, and Chief Wade Gourley of the Oklahoma City Police Department made the announcement.

“The U.S. Government identified Jerry Drake Varnell after learning of his intent to commit this attack,” said U.S. Attorney Downing.  “This case required thorough investigation and careful coordination among agents and prosecutors in a matter that is our highest priority—terrorism,” said U.S. Attorney Downing.  “The investigation and prosecution stopped an attempt to seemingly replicate the deadliest act of domestic terrorism in our Nation’s history.  The sentence imposed today will hold accountable Varnell for his crime and deter others from engaging in this conduct.  I want to thank the agents, analysts, law enforcement officials, and prosecutors whose dedication is responsible for this case.”

“The investigation of Varnell was the result of the tireless efforts of the FBI Oklahoma City Joint Terrorism Task Force and nearly 100 of our partners from federal, state, and local law enforcement. We cannot thank these departments enough for their work to bring Varnell to justice,” said Melissa Godbold, Special Agent in Charge of the FBI’s Oklahoma City Field Office. “I remind the public that combating terrorism, both domestically and internationally, has been and will continue to be the FBI’s number one priority.”

OCPD Chief Gourley said: “This case is extremely poignant considering we are approaching the 25th anniversary of the Oklahoma City Bombing.  This event not only scarred the community of Oklahoma City, but had a profound effect on the nation and set about a response known as the Oklahoma Standard.  This Standard was evident in the teamwork and cooperation among agencies in the successful investigation, apprehension, and prosecution of this case.  My thanks go out to all involved for their hard work and commitment to prevent another devastating attack in our community.”

In February 2019, a federal jury deliberated four hours before they returned a unanimous verdict of guilty on one count of attempting to use an explosive device to damage a building used in interstate commerce and one count of attempting to use a weapon of mass destruction against property used in interstate commerce.

The FBI arrested Varnell at approximately 1:00 a.m. on August 12, 2017, after he attempted to detonate what he believed to be an explosives-laden van he had parked in an alley next to BancFirst, at 101 North Broadway. 

The arrest was the culmination of a long-term domestic terrorism investigation involving an undercover operation, during which Varnell had been monitored closely for months as the bomb plot developed.  The explosives were inert, and the public was not in danger.  

FBI had received information that Varnell initially wanted to blow up the Federal Reserve Building in Washington, D.C., with a device similar to the 1995 Oklahoma City bombing because he was upset with the government.

On October 17, 2017, a federal grand jury charged Varnell with attempting to use an explosive device to damage and destroy BancFirst’s corporate offices.  After a psychological evaluation, the court entered an order on November 21, 2017, that found him competent to stand trial.  The grand jury returned a superseding indictment on April 17, 2018, that added one count of attempting to use a weapon of mass destruction.

At trial, the jury heard testimony from an informant who made recordings of his conversations with Varnell.  It also heard from the undercover FBI agent who helped Varnell build what he thought was a bomb, an FBI bomb technician, and others.  It listened to numerous recordings in which Varnell planned the attack and reviewed numerous written electronic communications that corroborated his intent. 

Furthermore, it heard the testimony of a defense expert concerning Varnell’s mental health.  Through its verdicts, the jury concluded any mental health problems did not prevent Varnell from forming the intent required for conviction.  It also determined the FBI did not entrap him.

This investigation was conducted by the FBI Joint Terrorism Task Force, including members from the Oklahoma City FBI; Homeland Security Investigations, part of the U.S. Department of Homeland Security; the Oklahoma City Police Department; the Edmond Police Department; the Oklahoma Highway Patrol; and the Oklahoma Bureau of Narcotics and Dangerous Drugs.  The FBI worked in conjunction with BancFirst during the investigation.  Oklahoma District Attorney Angela Marsee, of District 2, also provided assistance. 

The case was prosecuted by Assistant U.S. Attorneys Matt Dillon and Mark R. Stoneman, with assistance from the Justice Department’s Counterterrorism Section. (March 2020) Man Who Attempted to Bomb Downtown Oklahoma City Bank Sentenced to 25 Years

FBI takes down Russian-Based Hacker Platform; Arrests suspected Russian Site Administrator

A Russian-based cyber platform known as DEER.IO was shut down by the FBI today, and its suspected administrator – alleged Russian hacker Kirill Victorovich Firsov – was arrested and charged with crimes related to the hacking of U.S. companies for customers’ personal information.

DEER.IO was a Russian-based cyber platform that allowed criminals to purchase access to cyber storefronts on the platform and sell their criminal products or services.  DEER.IO started operations as of at least October 2013, and claimed to have over 24,000 active shops with sales exceeding $17 million. The platform was shut down pursuant to a seizure order issued by the Southern District of California Court.

FBI agents arrested Firsov, a Russian cyber hacker, on March 7 in New York City. Firsov not only managed the DEER.IO platform, he also advertised it on other cyber forums, which catered to hackers. Firsov is next scheduled to appear on April 16, 2020, before U.S. Magistrate Judge Allison H. Goddard.

According to a federal complaint, DEER.IO virtual stores offered for sale a variety of hacked and/or compromised U.S. and international financial and corporate data, Personally Identifiable Information (PII), and compromised user accounts from many U.S. companies. Individuals could also buy computer files, financial information, PII, and usernames and passwords taken from computers infected with malicious software (malware) located both in the U.S. and abroad. Law enforcement found no legitimate business advertising its services and/or products through a DEER.IO storefront. Store operators and customers accessed the storefront via the Internet.  Specifically, in this case, the FBI made purchases from DEER.IO storefronts hosted on Russian servers.

Soffe Men’s 3 Pack-USA Poly Cotton Military Tee

The DEER.IO platform offered a turnkey online storefront design and hosting platform, from which cybercriminals could advertise and sell their products (such as harvested credentials and hacked servers) and services (such as assistance performing a panoply of cyber hacking activities). The DEER.IO online stores were maintained on Russian-controlled infrastructure. The DEER.IO platform provided shop owners with an easy-to-use interface that allowed for the automated purchase and delivery of criminal goods and services.

Once shop access was purchased via the DEER.IO platform, the site then guided the newly-minted shop owner through an automated set-up to upload the products and services offered through the shop and configure crypto-currency wallets to collect payments for the purchased products and/or services.

As of 2019, a cybercriminal who wanted to sell contraband or offer criminal services through DEER.IO could purchase a storefront directly from the DEER.IO website for 800 Rubles (approximately $12.50) per month. The monthly fee was payable by Bitcoin or a variety of online payment methods such as WebMoney, a Russian based money transfer system similar to PayPal.

A cybercriminal who wanted to purchase from storefronts on the DEER.IO platform could use a web browser to navigate to the DEER.IO domain, which resolved to DEER.IO storefronts. DEER.IO contained a search function, so individuals could search for hacked accounts from specific companies or PII from specific countries, or the user could navigate through the platform, scanning stores advertising a wide array of hacked accounts or cyber-criminal services for sale. Purchases were also conducted using cryptocurrency, such as Bitcoin, or through the Russian-based money transfer systems.

On or about March 4, 2020, the FBI purchased approximately 1,100 gamer accounts from the DEER.IO store ACCOUNTS-MARKET.DEER.IS for under $20 in Bitcoin. Once payment was complete, the FBI obtained the gamer accounts, including the user name and password for each account. Out of the 1,100 gamer accounts, 249 accounts were hacked Company A accounts. Company A confirmed that if a hacker gained access to the user name and password of a user account, that hacker could use that account. A gamer account provides access to the user’s entire media library. The accounts often have linked payment methods, so the hacker could use the linked payment method to make additional purchases on the account. Some users also have subscription-based services attached to their gamer accounts.

On or about March 5, 2020, the FBI purchased approximately 999 individual PII accounts from the DEER.IO store SHIKISHOP.DEER.IS for approximately $170 in Bitcoin.  On that same date, the FBI purchased approximately 2,650 individual PII accounts from the DEER.IO store SHIKISHOP.DEER.IS for approximately $522 in Bitcoin. From those identities, the FBI identified names, dates of birth and U.S. Social Security numbers for multiple individuals who reside in San Diego County, including G.V. and L.Y.

“There is a robust underground market for hacked stolen information, and this was a novel way to try to market it to criminals hoping not to get caught,” said U.S. Attorney Robert Brewer. “Hackers are a threat to our economy, and our privacy and national security, and cannot be tolerated.”

FBI Special Agent in Charge Omer Meisel stated, “ was the largest centralized platform, which promoted and facilitated the sale of compromised social media and financial accounts, personally identifiable information (PII) and hacked computers on the internet. The seizure of this criminal website represents a significant step in reducing stolen data used to victimize individuals and businesses in the United States and abroad.  The FBI will continue to be at the forefront of protecting Americans from foreign and domestic cyber criminals.”

The office extends its appreciation to the New York Division of U.S. Customs and Border Protection operating at John F. Kennedy International Airport and to private sector cyber-security company Black Echo LLC, which provided assistance throughout the investigation.

Report cyber crimes by filing a complaint with the FBI’s Internet Crime Complaint Center, by calling your local FBI office or 1800 CALL FBI.

DEFENDANT                                    Case Number20MJ1029

Kirill Victorovich Firsov                    Age: 28


Unauthorized Solicitation of Access Devices, 18 USC Sec. 1029(a)(6)(A)

Maximum Penalty: Ten years in prison, $250,000 fine, restitution. (March 2020) FBI Takes Down a Russian-Based Hacker Platform; Arrests Suspected Russian Site Administrator